US6839731B2 - System and method for providing data communication in a device network - Google Patents

System and method for providing data communication in a device network Download PDF

Info

Publication number
US6839731B2
US6839731B2 US10443120 US44312003A US6839731B2 US 6839731 B2 US6839731 B2 US 6839731B2 US 10443120 US10443120 US 10443120 US 44312003 A US44312003 A US 44312003A US 6839731 B2 US6839731 B2 US 6839731B2
Authority
US
Grant status
Grant
Patent type
Prior art keywords
device
premises
data
computing device
recited
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US10443120
Other versions
US20040068657A1 (en )
Inventor
Bruce Alexander
David Antal
Matthew Litke
Christoph Schebel
Paul Thompson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BANERTEK LLC
Original Assignee
VIGILOS Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Grant date
Family has litigation

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/16Service discovery or service management, e.g. service location protocol [SLP] or Web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • H04L67/2866Architectural aspects
    • H04L67/288Distributed intermediate devices, i.e. intermediate device interaction with other intermediate devices on the same level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
    • H04L69/322Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer, i.e. layer seven
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • H04L67/2823Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format

Abstract

A system and method for facilitating data communications in a device network are provided. An integrated information system includes a number of premises-server computing devices, a central communication device, and a number of client computing devices. Each client computing device communicates with the central communication device to request access to device data from the premises-server computing devices. Once access rights are established, the client computing devices communicate directly with specific premises-server computing devices. A command application resident on each premises-server computing device, referred to as the command proxy, administers the direct flow of data between the computing devices.

Description

CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of U.S. Provisional Application No. 60/382,035, entitled SYSTEM AND METHOD FOR PROVIDING DATA COMMUNICATION IN A DEVICE NETWORK, and filed on May 20, 2002. U.S. Provisional Application No. 60/382,035 is incorporated by reference herein.

FIELD OF THE INVENTION

In general, the present invention relates to computer software, computer hardware, communication networks, and in particular, to a method and system for real-time data communication, including device condition and state, between networked computing devices.

BACKGROUND OF THE INVENTION

A number and variety of hardware and software devices may be utilized to capture, process, or transmit data within a device network. In a commercial environment a device network could include bar code readers, point-of-sale terminals, card scanners, cash registers, receipt printers, video cameras, and the like. In a medical, or patient-monitoring environment, the devices might include various devices used for monitoring vital signs and body functions such as blood pressure monitors, respiratory activity monitors, heart activity monitors (such as electrocardiogram devices), brain activity monitors (such as electro-encephalography monitors), and various output device such as intravenous pumps, incubators, respirators, and the like. In a physical-security environment the devices utilized might include door and window contacts, card readers, video cameras, motion detectors, environmental sensors, metal detectors, scanning devices, electronic article surveillance tags, biometric devices, and the like. Accordingly, stated generally, the particular devices used in a device network will vary in accordance with the required function of the device network.

In a conventional security embodiment the controls for security, environmental, and access control devices are typically administered through hardware control panels. Control panels are used to physically activate, deactivate, or configure devices that are physically or logically connected to a panel. Control panels generally include some type of small format screen to display textual data reflective of a device's condition such as “armed” or “disarmed.” A typical control panel has little memory and limited data processing or storage capacity. Further, the typical control panel is not well suited for data communication to remote monitoring terminals, such as the transmission of control commands from a remote monitoring terminal to a control panel. One approach to provide greater remote user functionality involves the use of a networked communications controller for facilitating communication to the devices. For example, devices such as video cameras can be connected to self-contained data collection/Web servers that operable to send collected data directly over a network without the assistance of an external device. Accordingly, information may be shared across a wide-area network (“WAN”) with remote clients.

In one embodiment, a remote client may gain access to device data and control through the utilization of data access tools hosted by a network-based software application, generally referred to as a browser application. Generally described, browser applications require “handshake” or acknowledgment signals prior to an exchange of data. However, the handshaking steps consume available processing capacity and bandwidth that can constrain access to and flow of data. Additionally, data flow is typically initiated by the receiving computing device such that the receiving computing device must constantly poll another networked device for data to enable pseudo real-time communications. If the polling frequency is too large, time-sensitive data may become stale before it is received. If the polling frequency is too small, computing and communication resources are unnecessarily strained. Furthermore, as the data tools are designed for a generic network software application, some data tool features may not be supported various implementations of a network software application. Accordingly, the functionality for a class of users utilizing the particular hosting software application is diminished.

In another embodiment, a computing device may be loaded with a resident software application specifically constructed to communicate with the networked communications controller. Although the resident software application provides a user with a more permanent communications solution, conventional resident software applications can present security risks for unauthorized users accessing the computing device. In one aspect, the amount of data a user may be authorized to access may vary greatly. In another aspect, multiple users may be utilizing the same computing device, with each user having potentially varying authorization levels. Further, the utilization of resident software applications places the burden on each individual user to update the resident software application in the event modifications are made. Accordingly, resident software applications become deficient in addressing varying authorization rights and maintenance needs.

Thus, there is a need for a system and method for processing data communications in a networked environment.

SUMMARY OF THE INVENTION

A system and method for facilitating data communications in a device network are provided. The device network includes a number of physically distributed premises-based server computing devices in communication with a number of data generating input and/or output devices, a central communication device, and a number of client computing devices. Each client computing device communicates with the central communication device to request access to device data collected by the premises-based server computing devices. Once access rights are established, the client computing devices communicate directly with specific premises-server computing devices. A command application resident on each premises-based server computing device, referred to as the command proxy, administers the direct flow of data between the computing devices.

In accordance with an aspect of the present invention, a method for processing device data is provided. The method may be implemented in a system including one or more premises-based server computing devices in communication with a number of input and/or output devices, a central communication device, and at least one client computing device in communication with the central communication device. In accordance with the method, a client computing device transmits an access request to the central communication device. The access request includes one or more identification attributes corresponding to a client computing device. The client computing device obtains a listing of available premises-based server computing devices. The listing of available premises-based server computing devices corresponds to a set of premises-server computing devices a client computing device is authorized to access based at least in part on the identification attributes. The client computing device transmits a communication request to communicate with one or more premises-server computing devices and establishes a direct connection with a proxy application in each of the one or more premises-server computing devices for which the communication request is successful. The client computing device obtains device information from a proxy application associated with the premises-server computing device. The device information corresponds to a current device state. Additionally, the client computing device cannot establish a direct connection with a proxy application in each of the one or more premises-server computing devices prior to obtaining the listing of available premises-server computing devices.

In another aspect of the present invention, a method for processing device data is provided. The method may be implemented in a system including one or more premises-server computing devices in communication with a number of input and/or output devices, a central communication device and at least one client computing device in communication with the central communication device. In accordance with the method, a central communication device obtains an access request from a client computing device. The access request includes one or more identification attributes corresponding to the client device. The central communication device generates a list of premises-server computing devices available for communication with the client device. The list of premises-server computing devices corresponds to a set of premises-server computing devices the client device is authorized to access based upon a processing of the one or more identification attributes. The central communication device transmits the list of premises-server computing devices available for communication with the client device. The client device cannot directly access the premises-server computing device prior to obtaining the list of premises-server computing devices available for communication.

In accordance with a further aspect of the present invention, a method for processing device data is provided. The method may be implemented in a premises-server computing device in communication with a number of input and/or output devices, wherein the premises-server computing device includes a command proxy application for communicating with client computing devices. In accordance with the method, a premises-server computing device obtains a communication request from a client computing device and registers the client computing device to obtain device data from at least one input and/or output device. The premises-server computing device obtains device data from the at least one input and/or output device and transmits the device data to the client computing device. The transmission of the device data to the client computing device occurs without requiring a request from the client computing device.

In accordance with yet another aspect of the present invention, a system for processing device data is provided. The system includes at least one client computing device for transmitting access requests via a communication network. The access request includes one or more identification attributes corresponding to the client computing device. The system also includes a central communication device in communication with the client computing device via a communication network. The central communication devices receives the access request and transmits a list of available premises-server computing devices. The list of available premises-server computing devices corresponds to a set of premises the client computing device is authorized to access. The system further includes one or more premises-server computing devices in communication with a number of input and/or output devices. The one or more premises-server computing devices includes a proxy application to communicate with the client computing device via a direct communication connection and to transmit device data to the client computing device via the direct communication connection. The client computing device cannot establish the direct communication connection with the premises-server computing device prior to obtaining the list of available premises-server computing devices from the central communication device.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing aspects and many of the attendant advantages of this invention will become more readily appreciated as the same become better understood by reference to the following detailed description, when taken in conjunction with the accompanying drawings, wherein:

FIG. 1 is a block diagram of an Internet environment;

FIG. 2 is a block diagram illustrative of an integrated information system including a number of premises servers, a central server and a number of client computing devices formed in accordance with the present invention;

FIG. 3 is a block diagram depicting an illustrative architecture for a premises server in accordance with the present invention;

FIG. 4 is a block diagram depicting an illustrative architecture for a central server in accordance with the present invention;

FIG. 5 is a block diagram depicting an illustrative architecture for client computing device in accordance with the present invention;

FIG. 6 is a block diagram of the integrated information system of FIG. 2 illustrating the connection of a client computing device to a premises server in accordance with the present invention;

FIG. 7 is a block diagram of the integrated information system of FIG. 2 illustrating the connection of a client computing device to a premises server in accordance with the present invention;

FIG. 8 is a block diagram of the integrated information system of FIG. 2 illustrating the connection of a client computing device to a premises server in accordance with the present invention; and

FIG. 9 is a flow diagram illustrative of device data monitoring routine implemented by a client computing device in accordance with the present invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

As described above, aspects of the present invention are embodied in a WWW or (“Web”) site accessible via the Internet. As is well known to those skilled in the art, the term “Internet” refers to the collection of networks and routers that use the Transmission Control Protocol/Internet Protocol (“TCP/IP”) to communicate with one another. A representative section of the Internet 20 is shown in FIG. 1, in which a plurality of local area networks (“LANs”) 24 and a wide area network (“WAN”) 26 are interconnected by routers 22. The routers 22 are special purpose computers used to interface one LAN or WAN to another. Communication links within the LANs may be twisted wire pair, or coaxial cable, while communication links between networks may utilize 58 Kbps analog telephone lines, 1 Mbps digital T-1 lines, 45 Mbps T-3 lines or other communications links known to those skilled in the art. Furthermore, computers 28 and other related electronic devices can be remotely connected to either the LANs 24 or the WAN 26 via a modem and temporary telephone or wireless link. It will be appreciated that the Internet 20 comprises a vast number of such interconnected networks, computers, and routers and that only a small, representative section of the Internet 20 is shown in FIG. 1. One skilled in the relevant art will appreciate that aspects of the present invention may be practiced on Internet networks, such as an Intranet.

The Internet has grown exponentially over the past decade and now links millions of computers worldwide. As the Internet has grown, so has the WWW. As is appreciated by those skilled in the art, the WWW is a vast collection of interconnected or “hypertext” documents written in HyperText Markup Language (“HTML”), or other markup languages, that are electronically stored at WWW sites throughout the Internet. A WWW site is a server connected to the Internet that has mass storage facilities for storing hypertext documents and that runs administrative software for handling requests for those stored hypertext documents. A hypertext document normally includes a number of hyperlinks, i.e., highlighted portions of text which link the document to another hypertext document possibly stored at a WWW site elsewhere on the Internet. Each hyperlink is associated with a Uniform Resource Locator (“URL”) that provides the exact location of the linked document on a server connected to the Internet and describes the document. Thus, whenever a hypertext document is retrieved from any WWW server, the document is considered to be retrieved from the WWW. As is known to those skilled in the art, a WWW server may also include facilities for storing and transmitting application programs, such as application programs written in the JAVA® programming language from Sun Microsystems, for execution on a remote computer. Likewise, a WWW server may also include facilities for executing scripts and other application programs on the WWW server itself.

A consumer or other remote consumer may retrieve hypertext documents from the WWW via a WWW browser application program. A WWW browser, such as Netscape's NAVIGATOR® or Microsoft's Internet Explorer, is a software application program for providing a graphical consumer interface to the WWW. Upon request from the consumer via the WWW browser, the WWW browser accesses and retrieves the desired hypertext document from the appropriate WWW server using the URL for the document and a protocol known as HyperText Transfer Protocol (“HTTP”). HTTP is a higher-level protocol than TCP/IP and is designed specifically for the requirements of the WWW. It is used on top of TCP/IP to transfer hypertext documents between servers and clients. The WWW browser may also retrieve application programs from the WWW server, such as JAVA applets, for execution on the client computer.

Referring now to FIG. 2, an actual embodiment of an integrated information system 200 in accordance with the present invention will be described. The integrated information system 200 is a subscriber-based system allowing monitoring devices (or a subset thereof) within one or more premises to be processed from a single, remote control location by way of a client computing device connected to a communication network. Additionally, the data from the monitoring devices may be processed at the remote control location according to one or more data rules. The control location may also customize output of the processed data dependent on an evaluation of the data rule pertaining to the device data. While the system of the present invention is utilized to integrate traditional security monitoring functions, it is also utilized to integrate any information input in a like manner.

With reference to FIG. 2, the integrated information system 200 includes a premises server 202 that functions as a communication gateway between various monitoring devices 208 and output devices 210 and the integrated information system 200. The premises server 202 includes a resident application program, referred to as a command proxy 204, that is operable to facilitate communication with external components of the integrated information system 200. The function of the command proxy application 204 will be explained in greater detail below.

In an illustrative embodiment of the present invention, the premises server 202 communicates with one or more device servers 206 via a communication network, such as a subnet, to address individual monitoring devices 208 and/or output devices 210. For example, the subnet may be a switched Ethernet network that runs through a high-speed switch. One or more device servers 206 may be configured in a distributed network to facilitate the sharing of computing resources, including processing, memory, and communication bandwidth. An illustrative device server network can be found in commonly assigned U.S. application Ser. No. 10/117,557 entitled SYSTEM AND METHOD FOR MANAGING A DEVICE NETWORK, which is hereby incorporated by reference. Alternatively, the premises server 202 may communicate directly with the monitoring devices 208 and output devices 210.

In accordance with the present invention, the monitoring devices 208 can include any number of sensors, monitors, and control devices (both hardware and software) used for environmental monitoring, access control, biometric identification, facial recognition, and intrusion detection. Still further, the monitoring devices 208 can include devices used to monitor industrial processes, inventory control processes, financial transactions (including point-of-sale systems) and medical or patient monitoring. It will be apparent to one skilled in the relevant art that additional or alternative monitoring devices 208 may be practiced with the present invention.

The device servers 206 also communicate with one or more output devices 210. In an illustrative embodiment, the output devices 210 can include audio speakers, display or other audio/visual displays. The output devices 210 may also include electrical or electro-mechanical devices that allow the system to perform actions. The output devices 210 can include computer system interfaces, point-of-sale terminals, cash registers, automatic teller machines, telephone interfaces, wireless interfaces, door and window locking mechanisms, aerosol sprayers, and the like. As will be readily understood by one skilled in the art, the type of output device is associated primarily with the type of action the integrated information system 200 produces. Accordingly, additional or alternative output devices 210 are considered to be within the scope of the present invention.

With continued reference to FIG. 2, the premises server 202 is in communication with a central server 212. Generally described, the central server 212 manages the number of premises servers 202 connected to the integrated information system 200. Additionally, the central server 212 manages access rights for external components attempting to access device data from the various premises servers 202. In an illustrative embodiment of the present invention, the central server 212 may also be operable to obtain monitoring device data from the premises servers 202 and process the data according to a number of processing rules. A description for a system and method for processing monitoring device data may be found in commonly assigned U.S. application Ser. No. 09/825,506 entitled SYSTEM AND METHOD FOR IMPLEMENTING AN INTEGRATED INFORMATION PORTAL, the disclosure of which is hereby incorporated by reference.

With continued reference to FIG. 2, the integrated information system 200 also includes one or more client computing devices 214 operable to communicate with the premises servers 202 and the central server 212. Each client computing device 214 corresponds to one or more authorized users having distinct access rights to the monitoring device data provided by the premises servers 202. For example, the client computing device 214 can be associated with premises owners, security directors or administrators, on-site security guards, technicians, remote monitors (including certified and non-certified monitors), customer service representatives, emergency personnel, and others.

The client computing devices 214 can include personal computers, hand-held computing devices, wireless application protocol enabled wireless devices, cellular or digital telephones, digital pagers, and the like. Moreover, the central server 212 may communicate with these devices via the Internet 20 utilizing electronic messaging or Web access, via wireless transmissions utilizing the wireless application protocol, short message services, audio transmission, and the like. As will be readily understood by one skilled in the art, the specific implementation of the communication mediums may require additional or alternative components to be practiced. All are considered to be within the scope of practicing the present invention. Additionally, in an illustrative embodiment of the present invention, each client computing device 214 utilizes a software application provided by the central processing server 212 to communicate with the premises servers 202, which will be explained in greater detail below. Although the premises server 202 and the central processing server 212 are referred to as “server” computing device, one skilled in the relevant art will appreciate that a variety of computing devices may provide the functionality associated with either premises server 202 or the central processing server 212. For example, the functionality may implemented in a peer-to-peer network environment.

FIG. 3 is a block diagram depicting an illustrative architecture for a premises server 202. Those of ordinary skill in the art will appreciate that the premises server 202 include many more components than those shown in FIG. 3. However, it is not necessary that all of these generally conventional components be shown in order to disclose an illustrative embodiment for practicing the present invention. As shown in FIG. 3, the premises server 202 includes a network interface 300 for connecting directly to a LAN or a WAN, or for connecting remotely to a LAN or WAN. Those of ordinary skill in the art will appreciate that the network interface 300 includes the necessary circuitry for such a connection, and is also constructed for use with the TCP/IP protocol, the particular network configuration of the LAN or WAN it is connecting to, and a particular type of coupling medium. The premises server 202 may also be equipped with a modem for connecting to the Internet through a point-to-point protocol (“PPP”) connection or a serial line Internet protocol (“SLIP”) connection as known to those skilled in the art.

The premises server 202 each includes a processing unit 302, an optional display 304, and a mass memory 306, all connected via a communication bus, or other communication device. The mass memory 306 generally comprises a RAM, ROM, and a permanent mass storage device, such as a hard disk drive, tape drive, optical drive, floppy disk drive, or combination thereof. The mass memory 306 stores an operating system 308 for controlling the operation of the premises server 202. It will appreciated that this component may comprises a general-purpose server operating system as is known to those skilled in the art, such as UNIX, LINUX™, or Microsoft WINDOWS NT®.

The mass memory 306 also stores program code and data for interfacing with various connected monitoring devices 208 and output devices 210, for processing the monitoring device data and for transmitting the data to client computing devices 214 and/or a central server 212. More specifically, mass memory stores a device interface application 310 in accordance with the present invention to obtain monitoring device data. The device interface application 310 comprises computer-executable instructions which, when executed by the premises server 202 obtains and transmits device data as will be explained below in greater detail. The mass memory 306 also stores a data processing application 312 for processing incoming and outgoing data. One skilled in the relevant art will appreciate that processing data can include encryption, compression, transformation, and the like. The mass memory 306 also stores a data messaging and delivery application known as a command proxy application 314 application. The command proxy application 314 is operable to manage data communications between the client computers 314/central server 212 and the premises server 212. It will be appreciated that these components may be stored on a computer-readable medium and loaded into the memory of the premises server using a drive mechanism associated with the computer-readable medium, such as a floppy, CD-ROM, DVD-ROM drive, or network drive 300.

FIG. 4 is a block diagram depicting an illustrative architecture for a central server 212 in accordance with the present invention. Those of ordinary skill in the art will appreciate that the central server 212 includes many more components then those shown in FIG. 4. However, it is not necessary that all of these generally conventional components be shown in order to disclose an illustrative embodiment for practicing the present invention. As shown in FIG. 4, the central server 212 includes a network interface 400 for connecting directly to a LAN or a WAN, or for connecting remotely to a LAN or WAN. Those of ordinary skill in the art will appreciate that the network interface 400 includes the necessary circuitry for such a connection, and is also constructed for use with the TCP/IP protocol, the particular network configuration of the LAN or WAN it is connecting to, and a particular type of coupling medium. The central server 212 may also be equipped with a modem for connecting to the Internet 20.

The central server 212 also includes a processing unit 402, an optional display 404 and a mass memory 406, all connected via a communication bus, or other communication device. The mass memory 406 generally comprises a RAM, ROM, and a permanent mass storage device, such as a hard disk drive, tape drive, optical drive, floppy disk drive, or combination thereof. The mass memory 406 stores an operating system 408 for controlling the operation of the central server 212. It will appreciated that this component may comprises a general-purpose server operating system as is known to those skilled in the art, such as UNIX, LINUX™, or Microsoft WINDOWS NT®.

The mass memory 406 also stores program code and data for interfacing with the premises servers 202 and the client computing devices 214 and for processing various data requests. More specifically, the mass memory 406 stores a premises server interface application 410 in accordance with the present invention for communicating with the premises server 202. The premises interface application 410 comprises computer-executable instructions, which, when executed by the central server 212, interfaces with the premises server 202 as will be explained below in greater detail. The mass memory 406 also stores a client computer interface application 412 for communicating with client computing devices 214 to obtain data requests and transmit communication software. The operation of the client computer interface application 412 will be described in greater detail below. The mass memory 406 also stores a data processing application 414 for processing client computing device 214 data requests in accordance with the present invention. It will be appreciated that these components may be stored on a computer-readable medium and loaded into the memory of the central server using a drive mechanism associated with the computer-readable medium, such as a floppy, CD-ROM, DVD-ROM drive, or network drive 400.

FIG. 5 is a block diagram depicting an illustrative architecture for a client computing device 214 utilized by authorized users to request and gain access to premises servers 202 in accordance with the present invention. Those of ordinary skill in the art will appreciate that the client computing device 214 includes many more components then those shown in FIG. 5. However, it is not necessary that all of these generally conventional components be shown in order to disclose an illustrative embodiment for practicing the present invention. As shown in FIG. 5, the client computing device 214 includes a network interface 500 for connecting directly to a LAN or a WAN, or for connecting remotely to a LAN or WAN. Those of ordinary skill in the art will appreciate that the network interface 500 includes the necessary circuitry for such a connection, and is also constructed for use with the TCP/IP protocol, the particular network configuration of the LAN or WAN it is connecting to, and a particular type of coupling medium. The client computing device 214 may also be equipped with a modem 502 for connecting to the Internet 20 through a PPP or SLIP connection as known to those skilled in the art.

The client computing device 214 also includes a processing unit 504, a display 506, and a mass memory 508, all connected via a communication bus, or other communication device. The mass memory 508 generally comprises a RAM, ROM, and a permanent mass storage device, such as a hard disk drive, tape drive, optical drive, floppy disk drive, or combination thereof. The mass memory 508 stores an operating system 510 for controlling the operation of the computing device. It will appreciated that this component may comprise a general-purpose operating system as is known to those skilled in the art, such as UNIX, LINUX™, or Microsoft WINDOWS NT®. The mass memory 508 also includes a central server interface application 512 operable to communicate with the central server 212. In an illustrative embodiment of the present invention, the central server interface application 512 includes a WWW browser application. The mass memory 508 further stores a premises server interface application 514 operable to interface with one or more premises servers 202. It will be appreciated that these components may be stored on a computer-readable medium and loaded into the memory of the central server using a drive mechanism associated with the computer-readable medium, such as a floppy, CD-ROM, DVD-ROM drive, or network drive 500.

Generally described, the present invention provides a distributed network environment for processing monitoring device 208 and output device 210 data. In an actual embodiment of the present invention, the central server 212 manages client computer request connection requests and provides requesting client computers access to one or more of the premises servers 212. Upon establishing access rights to a premises server 202, the client computer device 214 establishes a direct communication connection to targeted premises servers via the command proxy application 314. Through the direct communication connection, the command proxy application 314 and the client computing device 214 can transmit data as it is modified.

FIGS. 6-8 are illustrative of various integrated information system component interactions to process client computing device connection requests in accordance with the present invention. With reference to FIG. 6, a client computing device 214 initiates a communication request by transmitting an access request to the central server 212. In an illustrative embodiment of the present invention, the connection request is transmitted by the central server interface application 512 (FIG. 5), utilizing a WWW browser application. The access request can include information indicative of the access rights of a user associated with the client computing device 214 and of the version and resources of the premises server interface application 514 stored on the client computing device.

Upon receipt of the access request, the central server 212 processes the request to identify which premises servers 202 the client computing device 214 may access. Additionally, the central server 212 may also determine whether the client computing device 214 requires an additional software upgrade or update for the premises server interface application 514. The central server 212 transmits to the client computing device 214 a listing identifying which premises servers 202 are available for a data connection. Additionally, the central server 212 may transmit the premises server interface application 514 or updates to the current version of the premises server interface application 514 running on the client computing device 214. In an illustrative embodiment of the present invention, the central server 212 may utilize a Web-based software system, such as Sun Microsystems's JAVA WEB START, that enables the central server 212 to distribute and update the premises server interface application 514 via a WWW connection.

With reference now to FIG. 7, the client computer 214 obtains the access list and any software downloads/updates transmitted by the central server 212. Depending on a user selection, the client computing device 214 then initiates a command proxy interface protocol with the selected command proxy applications 314 (FIG. 3) on each selected premises server 202. The designated premises server 202 responds to the command proxy interface protocol and registers the client computing device with the command proxy application 314 of the premise server. In an illustrative embodiment of the present invention, the command proxy interface protocol allows the client computing device 214 to register with the command proxy application to receive monitoring device data. Further, the command proxy interface protocol allows the client computing device 214 to select which monitoring device data is requested and how the monitoring device data should be delivered. In certain embodiments, the client computing device 214 maintains a persistent connection to the command proxy application, in others the connection may be timed, periodic, or transitory.

With reference now to FIG. 8, upon registration by the client computing device 214, the command proxy application 314 can detect various monitoring device data changes. In an illustrative embodiment of the present invention, the data changes can include the transmission of monitoring device data from the monitoring devices 208. Additionally, the data changes can also include data or configuration changes submitted by a system administrator or other authorized user of the integrated information system 200. The command proxy application 314 can then transmit the data changes to the client computing device 214 in accordance with the registration requirements of the client computing device. Accordingly, the command proxy application 314 may individually filter outgoing data for each client computing device 214 registered with the command proxy application. Further, in an actual embodiment of the present invention, the command proxy application may also be operable to associate various data changes with a selected device to determine whether to send the related data should also be transmitted to the client computing device. Thus, the client computing device 214 can effectuate the receipt of selective real-time data from a number of premises servers 202.

FIG. 9 is a flow diagram illustrative of a device data monitoring routine 900 implemented by the client computing device 214 in accordance with the present invention. At block 902, the central server interface application 512 of the client computing device 214 initiates an access request with the central server 212. In an illustrative embodiment of the present invention, the central server interface application 512 may be a WWW browser-based application operable to communicate with the central server 212 via the WWW. At block 904, the central server interface application 512 obtains an access list and any applicable downloads from the central server. As discussed above, in an illustrative embodiment of the present invention, the distribution of the access list and the applicable downloads may be accomplished via a distribution such as JAVA WEB START. However, one skilled in the relevant art will appreciate that alternative distribution systems may be also be utilized in accordance with the present invention.

At block 906, the client computing device 214 obtains a selection of one or more premises servers 202 to monitor. At block 908, the premises server interface application 514 connects to each designated premises server 202 and registers with the command proxy application 314 residing on the premises server 202. In an illustrative embodiment of the present invention, the premises server interface application 514 may utilize a command proxy interface protocol to establish a connection with the command proxy application 314 and register data receipt preferences with the command proxy application 314. The command proxy interface protocol allows the client computing device 214 to register for specific data change events (e.g., specify types of data, data from specific devices) that are of interest and specify value ranges that will require that the client computing device be notified. One skilled in the relevant art will appreciate that types of available data will depend on the available devices connected to a selected premises server 202 and/or the potential utilization of the devices (e.g., security monitoring, patient care, inventory monitoring, and the like). Further, the command proxy interface protocol allows a client computing device to prioritize data change types for immediate or delayed transmission. One skilled in the relevant art will appreciate, however, alternative or modified command proxy interface protocols may also be practiced with the present invention.

In an actual embodiment of the present invention, the client computing device 214 may utilize an IP address specified in the communication with the central server 202 to identify the appropriate premise server 202. Accordingly, the first message sent by the client computing device 214 should include a command string identifying a particular premises server 202.

At block 910, the premises server interface application 514 obtains current device information from the premises server 202. In an actual embodiment of the present invention, the premises server 202 initializes the data transmission by transmitting selected device status information to the client computing device 214. At block 912, the premises server interface application 512 obtains changed data from the command proxy application 314. In an illustrative embodiment of the present invention, the command proxy application 314 for each premises server 202 can maintain a table corresponding to all data objects, such as a monitoring device 208 in its control, and the potential attribute values for the data objects. Further, the command proxy application 314 identifies the client computing devices 214 that have registered for notification for each data object attribute value. Accordingly, as data changes are received, the data processing application 312 can identify which client computing devices 214 are to be contacted by evaluating the relevant data managed by the command proxy application table.

At decision block 914, a test is conducted to determine whether the user has indicated a desire to terminate the connection. If the user does not wish to terminate the connection, the routine 900 returns to block 910. Alternatively, if the user wishes to terminate the connection, the client computing device 214 releases the connection at block 916. At block 918, the routine 900 terminates.

In an actual embodiment of the present invention, the monitoring device data can be categorized and processed as asset data, resource data, or device data. Asset data is obtained from a monitoring device corresponding to an identifiable object that is not capable of independent action. For example, asset data includes data obtained from a bar code or transponder identifying a particular object, such as a computer, in a particular location. Resource data is obtained from a monitoring device corresponding to an identifiable object that is capable of independent action. For example, resource data includes data from a magnetic card reader that identifies a particular person who has entered the premises. Event data is obtained from a monitoring device corresponding to an on/off state that is not correlated to an identifiable object. Event data is a default category for all of the monitoring devices. An illustrative system and method for processing asset data, resource data, and device data can be found in commonly assigned U.S. application Ser. No. 09/825,506, which has been incorporated by referenced. As will be readily understood by one skilled in the relevant art, alternative data categorizations are considered to be within the scope of the present invention.

The present invention provides a method for obtaining real-time device data over a network connection from a hardware and software monitoring devices. The invention describes an architecture that can be flexibly used to operate within or outside of a browser application. The system provides the ability to use application features regardless of whether they are supported by the browser applications or operating system in use on a client computing device.

While illustrative embodiments of the invention have been illustrated and described, it will be appreciated that various changes can be made therein without departing from the spirit and scope of the invention.

Claims (43)

1. In a system including one or more premises-server computing devices in communication with a number of input and/or output devices, a central communication device, and at least one client computing device in communication with the central communication device, a method for processing device data, the method comprising:
transmitting an access request to the central communication device, the access request including one or more identification attributes corresponding to a client computing device;
obtaining a listing of available premises-server computing devices, the listing of available premises-server computing devices corresponding to a set of premises-server computing devices a client computing device is authorized to access based at least in part on the identification attributes;
transmitting a communication request to communicate with one or more premises-server computing devices;
establishing a direct connection with a proxy application in each of the one or more premises-server computing devices for which the communication request is successful; and
obtaining device information from each proxy application associated with the one or more premises-server computing device, the device information corresponding to a current input and/or output device state;
wherein establishing a direct connection with a proxy application in each of the one or more premises-server computing devices cannot occur prior to obtaining the listing of available premises-server computing devices.
2. The method as recited in claim 1, wherein transmitting an access request includes transmitting information used to authenticate an individual user.
3. The method as recited in claim 1, wherein transmitting an access request includes:
accessing a network-based Web site corresponding to the central communication device;
providing the one or more identification attributes; and
submitting the access request via the network-based Web site.
4. The method as recited in claim 1, wherein obtaining a listing of available premises-server computing devices includes obtaining a listing of available input and/or output devices connected to each of the available premises-server computing devices.
5. The method as recited in claim 4, wherein transmitting a communication request to communicate with one or more premises-server computing devices includes transmitting a selection to receive data from one or more available devices.
6. The method as recited in claim 5, wherein transmitting a communication request includes transmitting information used for the delivery of input and/or output device data.
7. The method as recited in claim 1, wherein transmitting a communication request to communicate with one or more premises-server computing devices includes initiating a command proxy protocol registering a client computing device with the proxy application of the premises-server computing device.
8. The method as recited in claim 1, wherein the direct connection with the proxy application is a persistent connection.
9. The method as recited in claim 1 further comprising obtaining updated input and/or output device data from the proxy application, wherein the updated device data is obtained without subsequent request from the client computing device.
10. The method as recited in claim 1 further comprising obtaining software updates from the central communication device upon transmitting an access request to the central communication device.
11. The method as recited in claim 1, wherein establishing a direct connection with a proxy application includes establishing a direct connection with a proxy application in a private network.
12. The method as recited in claim 1, wherein obtaining device information from each proxy application in the one or more premises-server computing device includes obtaining device information filtered in accordance with one or more criteria submitted to the proxy application.
13. A computer-readable medium having computer-executable instructions for performing the method recited in claim 1.
14. A computer system including a processor, a memory and an operating system, the computer system operable to perform the method recited in claim 1.
15. In a system including one or more premises-server computing devices in communication with a number of input and/or output devices, a central communication device and at least one client computing device in communication with the central communication device, a method for processing device data, the method comprising:
obtaining an access request from a client computing device, the access request including one or more identification attributes corresponding to the client device;
generating a list of premises-server computing devices available for communication with the client device, the list of premises-server computing devices corresponding to a set of premises-server computing devices the client device obtains access based upon a processing of the one or more identification attributes; and
transmitting the list of premises-server computing devices available for communication with the client device;
wherein the client device cannot directly access the premises-server computing device prior to obtaining the list of premises-server computing devices available for communication.
16. The method as recited in claim 15, wherein obtaining an access request includes obtaining a user identification and password.
17. The method as recited in claim 15 further comprising:
generating a network-based Web site in response to an initial access request from a client device; and
obtaining a user input of the one or more identification attributes corresponding to the client device.
18. The method as recited in claim 15, wherein transmitting the list of premises-server computing devices available for communication with the client device includes transmitting an identification of one or more devices associated with each of the premises-server computing device available for communication.
19. The method as recited in claim 15, wherein transmitting the list of premises-server computing devices available for communication with the client device includes transmitting an IP address corresponding to each premises-server computing device, the IP address facilitating direct communication with a premises-server computing device.
20. The method as recited in claim 15 further comprising transmitting software updates with the transmission of the list of available premises-server computing devices.
21. A computer-readable medium having computer-executable instructions for performing the method recited in claim 15.
22. A computer system having a processor, a memory and an operating system, the computer system operable to perform the method recited in claim 15.
23. In a premises-server computing device in communication with a number of input and/or output devices, wherein the premises-server computing device includes a command proxy application for communicating with client computing devices, a method for processing device data comprising:
obtaining a communication request from a client computing device;
registering the client computing device to obtain device data from at least one input and/or output device;
obtaining device data from the at least one input and/or output device;
transmitting the device data to the client computing device, wherein transmitting the device data to the client computing device occurs without requiring a request from the client computing device.
24. The method as recited in claim 23, wherein registering the client computing device includes registering interest in updates made to one or more records in a table used to collect attribute data associated with the input and/or devices.
25. The method as recited in claim 24, wherein the table of available input and/or output device data includes criteria for filtering the data to be received by the client computing device.
26. The method as recited in claim 25, wherein filtering the data from the input and/or output device includes a threshold of data values to be satisfied prior to transmitting the input and/or output device data to the client computing device.
27. The method as recited in claim 25, wherein filtering the input and/or output device data includes a range of data values that must be satisfied prior to transmitting the data from the input and/or output device to the client computing device.
28. A computer-readable medium having computer-executable instructions for performing the method recited in claim 25.
29. A computer system having a processor, a memory and an operating environment, the computer system operable to perform the method recited in claim 25.
30. The method as recited in claim 24, wherein the table of available device data includes instructions for processing the data from the input and/or device to be received by the client computing device.
31. The method as recited in claim 30, wherein processing the input/and or output device data includes prioritizing the data from the input and/or output device.
32. The method as recited in claim 30, wherein processing the data from the input/and or output device includes formatting.
33. The method as recited in claim 24, wherein the table of available input and/or output device data includes a schedule for transmitting data from the input and/or output device to the client computing device.
34. A system for processing the data from the input and/or output device, the system comprising:
at least one client computing device for transmitting access requests via a communication network, the access requests includes one or more identification attributes corresponding to the client computing device;
a central communication device in communication with the client computing device via a communication network, wherein the central communication devices receives the access request and transmits a list of available premises-server computing devices, the list of available premises-server computing devices corresponding to a set of premises the client computing device is authorized to access; and
one or more premises-server computing devices in communication with a number of input and/or output devices, the one or more premises-server computing devices including a proxy application to communicate with the client computing device via a direct communication connection and to transmit device data to the client computing device via the direct communication connection;
wherein the client computing device cannot establish the direct communication connection with the premises-server computing device prior to obtaining the list of available premises-server computing devices from the central communication device.
35. The system as recited in claim 34, wherein the client computing device transmits the access request via a network-based Web site provided by the central communication device.
36. The system as recited in claim 34, wherein the central communication device transmits software application updates to the client computing device in response to an access request.
37. The system as recited in claim 34, wherein the proxy application in the premises-server computing device registers the client computing device to receive the data from the input/and or output device.
38. The system as recited in claim 37, wherein the registration includes an identification of device data to be received by the client computing device.
39. The system as recited in claim 37, wherein the registration includes instructions for filtering the device data prior to transmitting the device data to the client computing device.
40. The system as recited in claim 37, wherein the registration includes instructions for processing the device data prior to transmitting the device data to the client computing device.
41. The system as recited in claim 37, wherein the direct connection between the proxy application and the client computing device is persistent.
42. The system as recited in claim 37, wherein the proxy application transmits updated device data to the client computing device without requiring a request for updated device data from the client computing device.
43. The system as recited in claim 37 further comprising a device server in communication with the premises-based server computing device, wherein the device server communicates directly with the input and output devices.
US10443120 2002-05-20 2003-05-20 System and method for providing data communication in a device network Active US6839731B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US38203502 true 2002-05-20 2002-05-20
US10443120 US6839731B2 (en) 2002-05-20 2003-05-20 System and method for providing data communication in a device network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10443120 US6839731B2 (en) 2002-05-20 2003-05-20 System and method for providing data communication in a device network

Publications (2)

Publication Number Publication Date
US20040068657A1 true US20040068657A1 (en) 2004-04-08
US6839731B2 true US6839731B2 (en) 2005-01-04

Family

ID=29584349

Family Applications (1)

Application Number Title Priority Date Filing Date
US10443120 Active US6839731B2 (en) 2002-05-20 2003-05-20 System and method for providing data communication in a device network

Country Status (2)

Country Link
US (1) US6839731B2 (en)
WO (1) WO2003101035A1 (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030208537A1 (en) * 2002-05-01 2003-11-06 Lane James K. Real-time data collection and distribution among office productivity software applications
US20050223356A1 (en) * 2004-04-01 2005-10-06 Young Soft Pvt. Ltd. System and method for program execution
US20060036838A1 (en) * 2004-08-10 2006-02-16 Salcedo David M Security system network interface and security system incorporating the same
US20060236119A1 (en) * 2005-04-18 2006-10-19 Bobbitt Joseph M Biometric identification linked interactive information system and method
US20070258486A1 (en) * 2006-05-02 2007-11-08 Harris Corporation Systems and methods for close queuing to support quality of service
US20070258445A1 (en) * 2006-05-02 2007-11-08 Harris Corporation Systems and methods for protocol filtering for quality of service
US20070291653A1 (en) * 2006-06-16 2007-12-20 Harris Corporation Method and system for network-independent qos
US20070291780A1 (en) * 2006-06-16 2007-12-20 Harris Corporation System and methods for generic data transparent rules to support quality of service
US20070291657A1 (en) * 2006-06-16 2007-12-20 Harris Corporation Method and system for rule-based sequencing for QoS
US20070291656A1 (en) * 2006-06-16 2007-12-20 Harris Corporation Method and system for outbound content-based QoS
US20070291766A1 (en) * 2006-06-16 2007-12-20 Harris Corporation Method and system for inbound content-based QoS
US20070291768A1 (en) * 2006-06-16 2007-12-20 Harris Corporation Method and system for content-based differentiation and sequencing as a mechanism of prioritization for QOS
US20070291751A1 (en) * 2006-06-20 2007-12-20 Harris Corporation Method and system for compression based quality of service
US20070291647A1 (en) * 2006-06-19 2007-12-20 Harris Corporation Method and System for Fault-Tolerant Quality of Service
US20070297416A1 (en) * 2006-06-21 2007-12-27 Harris Corporation Systems and methods for adaptive throughput management for event-driven message-based data
US20080025318A1 (en) * 2006-07-31 2008-01-31 Harris Corporation Systems and methods for dynamically customizable quality of service on the edge of a network
US20080082631A1 (en) * 2006-09-29 2008-04-03 Motorola, Inc. Inter Application User Interface Integration in Element Management Systems
US20090044258A1 (en) * 2006-04-11 2009-02-12 Huawei Technologies Co., Ltd. Communication method and service in personal area network
US20100004984A1 (en) * 2008-07-02 2010-01-07 Verizon Data Services Llc Television distribution of product/service coupon codes
US20100051030A1 (en) * 2008-09-04 2010-03-04 Sequal Technologies, Inc. System and Method for Controlling Bolus Pulse Duration Based on Inspiratory Time in an Oxygen Concentration System
US7894509B2 (en) 2006-05-18 2011-02-22 Harris Corporation Method and system for functional redundancy based quality of service
US8225988B1 (en) 2008-10-08 2012-07-24 Bank Of America Corporation Load balancing for cash handling devices
US8300653B2 (en) 2006-07-31 2012-10-30 Harris Corporation Systems and methods for assured communications with quality of service
US8365249B1 (en) * 2007-01-30 2013-01-29 Sprint Communications Company L.P. Proxy registration and authentication for personal electronic devices
US20150278781A1 (en) * 2014-03-31 2015-10-01 Diebold Self-Service Systems Division Of Diebold, Incorporated Api engine for a self-service device

Families Citing this family (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040162637A1 (en) 2002-07-25 2004-08-19 Yulun Wang Medical tele-robotic system with a master remote station with an arbitrator
US6925357B2 (en) 2002-07-25 2005-08-02 Intouch Health, Inc. Medical tele-robotic system
US7813836B2 (en) 2003-12-09 2010-10-12 Intouch Technologies, Inc. Protocol for a remotely controlled videoconferencing robot
US20050204438A1 (en) 2004-02-26 2005-09-15 Yulun Wang Graphical interface for a remote presence system
US10079839B1 (en) 2007-06-12 2018-09-18 Icontrol Networks, Inc. Activation of gateway device
US10051078B2 (en) 2007-06-12 2018-08-14 Icontrol Networks, Inc. WiFi-to-serial encapsulation in systems
US8988221B2 (en) 2005-03-16 2015-03-24 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US9191228B2 (en) 2005-03-16 2015-11-17 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US9609003B1 (en) 2007-06-12 2017-03-28 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US8963713B2 (en) 2005-03-16 2015-02-24 Icontrol Networks, Inc. Integrated security network with security alarm signaling system
US8077963B2 (en) 2004-07-13 2011-12-13 Yulun Wang Mobile robot with a head-based movement mapping scheme
US10127802B2 (en) 2010-09-28 2018-11-13 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US9531593B2 (en) 2007-06-12 2016-12-27 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US20060259193A1 (en) * 2005-05-12 2006-11-16 Yulun Wang Telerobotic system with a dual application screen presentation
US9198728B2 (en) 2005-09-30 2015-12-01 Intouch Technologies, Inc. Multi-camera mobile teleconferencing platform
US8849679B2 (en) 2006-06-15 2014-09-30 Intouch Technologies, Inc. Remote controlled robot system that provides medical images
US10142392B2 (en) 2007-01-24 2018-11-27 Icontrol Networks, Inc. Methods and systems for improved system performance
US8265793B2 (en) 2007-03-20 2012-09-11 Irobot Corporation Mobile robot for telecommunication
US8451986B2 (en) 2007-04-23 2013-05-28 Icontrol Networks, Inc. Method and system for automatically providing alternate network access for telecommunications
US9160783B2 (en) 2007-05-09 2015-10-13 Intouch Technologies, Inc. Robot system that operates through a network firewall
KR101466573B1 (en) * 2008-01-22 2014-12-10 삼성전자주식회사 Method of performing communication using a plurality of network interface mounted to the communication terminal apparatus and communication terminal apparatus
US8170241B2 (en) 2008-04-17 2012-05-01 Intouch Technologies, Inc. Mobile tele-presence system with a microphone system
US9193065B2 (en) * 2008-07-10 2015-11-24 Intouch Technologies, Inc. Docking system for a tele-presence robot
US9842192B2 (en) * 2008-07-11 2017-12-12 Intouch Technologies, Inc. Tele-presence robot system with multi-cast features
US8340819B2 (en) * 2008-09-18 2012-12-25 Intouch Technologies, Inc. Mobile videoconferencing robot system with network adaptive driving
US8996165B2 (en) * 2008-10-21 2015-03-31 Intouch Technologies, Inc. Telepresence robot with a camera boom
US8463435B2 (en) 2008-11-25 2013-06-11 Intouch Technologies, Inc. Server connectivity control for tele-presence robot
US9138891B2 (en) * 2008-11-25 2015-09-22 Intouch Technologies, Inc. Server connectivity control for tele-presence robot
US8849680B2 (en) 2009-01-29 2014-09-30 Intouch Technologies, Inc. Documentation through a remote presence robot
US8897920B2 (en) * 2009-04-17 2014-11-25 Intouch Technologies, Inc. Tele-presence robot system with software modularity, projector and laser pointer
US8384755B2 (en) 2009-08-26 2013-02-26 Intouch Technologies, Inc. Portable remote presence robot
US8670017B2 (en) 2010-03-04 2014-03-11 Intouch Technologies, Inc. Remote presence system including a cart that supports a robot face and an overhead camera
US9014848B2 (en) 2010-05-20 2015-04-21 Irobot Corporation Mobile robot system
US8935005B2 (en) 2010-05-20 2015-01-13 Irobot Corporation Operating a mobile robot
US8918213B2 (en) 2010-05-20 2014-12-23 Irobot Corporation Mobile human interface robot
US9264664B2 (en) 2010-12-03 2016-02-16 Intouch Technologies, Inc. Systems and methods for dynamic bandwidth allocation
US9147337B2 (en) 2010-12-17 2015-09-29 Icontrol Networks, Inc. Method and system for logging security event data
US8930019B2 (en) 2010-12-30 2015-01-06 Irobot Corporation Mobile human interface robot
EP2668008A4 (en) 2011-01-28 2018-01-24 Intouch Technologies, Inc. Interfacing with a mobile telepresence robot
US9323250B2 (en) 2011-01-28 2016-04-26 Intouch Technologies, Inc. Time-dependent navigation of telepresence robots
US20140139616A1 (en) 2012-01-27 2014-05-22 Intouch Technologies, Inc. Enhanced Diagnostics for a Telepresence Robot
US8836751B2 (en) 2011-11-08 2014-09-16 Intouch Technologies, Inc. Tele-presence system with a user interface that displays different communication links
US9251313B2 (en) 2012-04-11 2016-02-02 Intouch Technologies, Inc. Systems and methods for visualizing and managing telepresence devices in healthcare networks
US8902278B2 (en) 2012-04-11 2014-12-02 Intouch Technologies, Inc. Systems and methods for visualizing and managing telepresence devices in healthcare networks
US9361021B2 (en) 2012-05-22 2016-06-07 Irobot Corporation Graphical user interfaces including touchpad driving interfaces for telemedicine devices
WO2013176762A1 (en) 2012-05-22 2013-11-28 Intouch Technologies, Inc. Social behavior rules for a medical telepresence robot
US9098611B2 (en) 2012-11-26 2015-08-04 Intouch Technologies, Inc. Enhanced video interaction for a user interface of a telepresence network
US8930576B1 (en) * 2013-07-25 2015-01-06 KE2 Therm Solutions, Inc. Secure communication network
US8850072B1 (en) * 2013-07-25 2014-09-30 KE2 Therm Solutions, Inc. Secure communication network

Citations (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4216375A (en) 1979-03-12 1980-08-05 A-T-O Inc. Self-contained programmable terminal for security systems
US4218690A (en) 1978-02-01 1980-08-19 A-T-O, Inc. Self-contained programmable terminal for security systems
US4581634A (en) 1982-11-18 1986-04-08 Williams Jarvis L Security apparatus for controlling access to a predetermined area
US4714995A (en) 1985-09-13 1987-12-22 Trw Inc. Computer integration system
US4721954A (en) 1985-12-18 1988-01-26 Marlee Electronics Corporation Keypad security system
US4816658A (en) 1983-01-10 1989-03-28 Casi-Rusco, Inc. Card reader for security system
US4837568A (en) 1987-07-08 1989-06-06 Snaper Alvin A Remote access personnel identification and tracking system
US4839640A (en) 1984-09-24 1989-06-13 Adt Inc. Access control system having centralized/distributed control
US4962473A (en) 1988-12-09 1990-10-09 Itt Corporation Emergency action systems including console and security monitoring apparatus
US4998279A (en) 1984-11-30 1991-03-05 Weiss Kenneth P Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics
US5097505A (en) 1989-10-31 1992-03-17 Securities Dynamics Technologies, Inc. Method and apparatus for secure identification and verification
US5210873A (en) 1990-05-25 1993-05-11 Csi Control Systems International, Inc. Real-time computer system with multitasking supervisor for building access control or the like
US5367624A (en) 1993-06-11 1994-11-22 Consilium, Inc. Interface for controlling transactions in a manufacturing execution system
US5475378A (en) 1993-06-22 1995-12-12 Canada Post Corporation Electronic access control mail box system
US5475375A (en) 1985-10-16 1995-12-12 Supra Products, Inc. Electronic access control systems
US5544062A (en) 1995-01-31 1996-08-06 Johnston, Jr.; Louie E. Automated system for manufacturing of customized military uniform insignia badges
US5600368A (en) 1994-11-09 1997-02-04 Microsoft Corporation Interactive television system and method for viewer control of multiple camera viewpoints in broadcast programming
WO1997007486A1 (en) 1995-08-21 1997-02-27 Prism Video, Inc. Event monitoring
US5614890A (en) 1993-12-27 1997-03-25 Motorola, Inc. Personal identification system
US5629981A (en) 1994-07-29 1997-05-13 Texas Instruments Incorporated Information management and security system
US5654696A (en) 1985-10-16 1997-08-05 Supra Products, Inc. Method for transferring auxillary data using components of a secure entry system
US5678039A (en) 1994-09-30 1997-10-14 Borland International, Inc. System and methods for translating software into localized versions
US5680328A (en) 1995-05-22 1997-10-21 Eaton Corporation Computer assisted driver vehicle inspection reporting system
US5682142A (en) 1994-07-29 1997-10-28 Id Systems Inc. Electronic control system/network
EP0804031A2 (en) 1996-04-23 1997-10-29 Canon Kabushiki Kaisha Image display apparatus, camera control apparatus and method
US5729471A (en) 1995-03-31 1998-03-17 The Regents Of The University Of California Machine dynamic selection of one video camera/image of a scene from multiple video cameras/images of the scene in accordance with a particular perspective on the scene, an object in the scene, or an event in the scene
US5742286A (en) 1995-11-20 1998-04-21 International Business Machines Corporation Graphical user interface system and method for multiple simultaneous targets
US5768119A (en) 1996-04-12 1998-06-16 Fisher-Rosemount Systems, Inc. Process control system including alarm priority adjustment
US5870733A (en) 1996-06-14 1999-02-09 Electronic Data Systems Corporation Automated system and method for providing access data concerning an item of business property
US5903455A (en) 1996-02-06 1999-05-11 Fisher-Rosemount Systems, Inc. Interface controls for use in a field device management system
US5923264A (en) 1995-12-22 1999-07-13 Harrow Products, Inc. Multiple access electronic lock system
US5960174A (en) 1996-12-20 1999-09-28 Square D Company Arbitration method for a communication network
US6064723A (en) * 1994-09-16 2000-05-16 Octel Communications Corporation Network-based multimedia communications and directory system and method of operation
WO2001028251A1 (en) 1999-10-12 2001-04-19 Vigilos, Inc. System and method for controlling the storage and remote retrieval of surveillance video images
US6233588B1 (en) * 1998-12-02 2001-05-15 Lenel Systems International, Inc. System for security access control in multiple regions
US20020019945A1 (en) * 2000-04-28 2002-02-14 Internet Security System, Inc. System and method for managing security events on a network
US20020029263A1 (en) * 2000-07-07 2002-03-07 International Business Machines Corporation Network system, device management system, device management method, data processing method, storage medium, and internet service provision method
US6356949B1 (en) * 1999-01-29 2002-03-12 Intermec Ip Corp. Automatic data collection device that receives data output instruction from data consumer

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5588148A (en) * 1994-09-06 1996-12-24 Motorola, Inc. Method for managing data transfer between computing devices
US6553414B1 (en) * 1998-10-02 2003-04-22 Canon Kabushiki Kaisha System used in plural information processing devices for commonly using peripheral device in network
FR2787955B1 (en) * 1998-12-29 2003-01-24 Canon Kk Method and information transfer device, Method and information reception device and network stations implementing them
US6480901B1 (en) * 1999-07-09 2002-11-12 Lsi Logic Corporation System for monitoring and managing devices on a network from a management station via a proxy server that provides protocol converter
US6442432B2 (en) * 1999-12-21 2002-08-27 Medtronic, Inc. Instrumentation and software for remote monitoring and programming of implantable medical devices (IMDs)

Patent Citations (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE35336E (en) 1978-02-01 1996-09-24 Casi-Rusco, Inc. Self-contained programmable terminal for security systems
US4218690A (en) 1978-02-01 1980-08-19 A-T-O, Inc. Self-contained programmable terminal for security systems
US4216375A (en) 1979-03-12 1980-08-05 A-T-O Inc. Self-contained programmable terminal for security systems
US4581634A (en) 1982-11-18 1986-04-08 Williams Jarvis L Security apparatus for controlling access to a predetermined area
US4816658A (en) 1983-01-10 1989-03-28 Casi-Rusco, Inc. Card reader for security system
US4839640A (en) 1984-09-24 1989-06-13 Adt Inc. Access control system having centralized/distributed control
US4998279A (en) 1984-11-30 1991-03-05 Weiss Kenneth P Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics
US4714995A (en) 1985-09-13 1987-12-22 Trw Inc. Computer integration system
US5475375A (en) 1985-10-16 1995-12-12 Supra Products, Inc. Electronic access control systems
US5654696A (en) 1985-10-16 1997-08-05 Supra Products, Inc. Method for transferring auxillary data using components of a secure entry system
US4721954A (en) 1985-12-18 1988-01-26 Marlee Electronics Corporation Keypad security system
US4837568A (en) 1987-07-08 1989-06-06 Snaper Alvin A Remote access personnel identification and tracking system
US4962473A (en) 1988-12-09 1990-10-09 Itt Corporation Emergency action systems including console and security monitoring apparatus
US5097505A (en) 1989-10-31 1992-03-17 Securities Dynamics Technologies, Inc. Method and apparatus for secure identification and verification
US5210873A (en) 1990-05-25 1993-05-11 Csi Control Systems International, Inc. Real-time computer system with multitasking supervisor for building access control or the like
US5367624A (en) 1993-06-11 1994-11-22 Consilium, Inc. Interface for controlling transactions in a manufacturing execution system
US5475378A (en) 1993-06-22 1995-12-12 Canada Post Corporation Electronic access control mail box system
US5614890A (en) 1993-12-27 1997-03-25 Motorola, Inc. Personal identification system
US5682142A (en) 1994-07-29 1997-10-28 Id Systems Inc. Electronic control system/network
US5629981A (en) 1994-07-29 1997-05-13 Texas Instruments Incorporated Information management and security system
US6064723A (en) * 1994-09-16 2000-05-16 Octel Communications Corporation Network-based multimedia communications and directory system and method of operation
US5678039A (en) 1994-09-30 1997-10-14 Borland International, Inc. System and methods for translating software into localized versions
US5600368A (en) 1994-11-09 1997-02-04 Microsoft Corporation Interactive television system and method for viewer control of multiple camera viewpoints in broadcast programming
US5544062A (en) 1995-01-31 1996-08-06 Johnston, Jr.; Louie E. Automated system for manufacturing of customized military uniform insignia badges
US5729471A (en) 1995-03-31 1998-03-17 The Regents Of The University Of California Machine dynamic selection of one video camera/image of a scene from multiple video cameras/images of the scene in accordance with a particular perspective on the scene, an object in the scene, or an event in the scene
US5680328A (en) 1995-05-22 1997-10-21 Eaton Corporation Computer assisted driver vehicle inspection reporting system
WO1997007486A1 (en) 1995-08-21 1997-02-27 Prism Video, Inc. Event monitoring
US5742286A (en) 1995-11-20 1998-04-21 International Business Machines Corporation Graphical user interface system and method for multiple simultaneous targets
US5923264A (en) 1995-12-22 1999-07-13 Harrow Products, Inc. Multiple access electronic lock system
US5903455A (en) 1996-02-06 1999-05-11 Fisher-Rosemount Systems, Inc. Interface controls for use in a field device management system
US5768119A (en) 1996-04-12 1998-06-16 Fisher-Rosemount Systems, Inc. Process control system including alarm priority adjustment
EP0804031A2 (en) 1996-04-23 1997-10-29 Canon Kabushiki Kaisha Image display apparatus, camera control apparatus and method
US5870733A (en) 1996-06-14 1999-02-09 Electronic Data Systems Corporation Automated system and method for providing access data concerning an item of business property
US5960174A (en) 1996-12-20 1999-09-28 Square D Company Arbitration method for a communication network
US6233588B1 (en) * 1998-12-02 2001-05-15 Lenel Systems International, Inc. System for security access control in multiple regions
US6356949B1 (en) * 1999-01-29 2002-03-12 Intermec Ip Corp. Automatic data collection device that receives data output instruction from data consumer
WO2001028251A1 (en) 1999-10-12 2001-04-19 Vigilos, Inc. System and method for controlling the storage and remote retrieval of surveillance video images
US20020019945A1 (en) * 2000-04-28 2002-02-14 Internet Security System, Inc. System and method for managing security events on a network
US20020029263A1 (en) * 2000-07-07 2002-03-07 International Business Machines Corporation Network system, device management system, device management method, data processing method, storage medium, and internet service provision method

Non-Patent Citations (12)

* Cited by examiner, † Cited by third party
Title
Axis Communications, publication entitled "Axis 200+ Web Camera".
Axis Communications, publication entitled "Axis 240 Camera Server".
Axis Communications, ww.axis.se/products/camera_servers/cam_app_sol.htm, "Network Cameras Applications and Solutions," printed Sep. 28, 1999.
Axis Communications, www.axis.se/products/cam_240/, "30 Frames/Second," printed Sep. 28, 1999.
Axis Communications, www.axis.se/products/camera_servers/cam_fb.html, "Features and Benefits," printed Sep. 28, 1999.
EyeCast Announces EyeCapture Services, Press Release dated Jul. 8, 1998.
EyeCast.com Adds 360-degree Continuous Pan Rotation Cameras to It's[sic] EyeView Service, Press Release dated Mar. 15, 1999.
EyeCast.com Announces EyeView Control, Press Release dated Oct. 12, 1998.
EyeCast.com Introduces SchoolCast services for School Safety Officials and Law Enforcement Agencies, Press Release dated Apr. 28, 1999.
EyeCast.com, "EyeCast secures deals . . . ," Washington Business Journal, Aug. 13-19, 1999, Tech Section, p. 16.
EyeCast.com, Inc., "Providing Live Interactive Video for Surveillance & Monitoring Over the Internet".
Screen Printing from www.remotecams.com, "Take a Step Into the Future . . . ," printed Sep. 17, 1999.

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030208537A1 (en) * 2002-05-01 2003-11-06 Lane James K. Real-time data collection and distribution among office productivity software applications
US20050223356A1 (en) * 2004-04-01 2005-10-06 Young Soft Pvt. Ltd. System and method for program execution
US7685230B2 (en) * 2004-04-01 2010-03-23 Vaakya Technologies Private Limited System and method for program execution
US20060036838A1 (en) * 2004-08-10 2006-02-16 Salcedo David M Security system network interface and security system incorporating the same
US20060236119A1 (en) * 2005-04-18 2006-10-19 Bobbitt Joseph M Biometric identification linked interactive information system and method
US20090044258A1 (en) * 2006-04-11 2009-02-12 Huawei Technologies Co., Ltd. Communication method and service in personal area network
US20070258486A1 (en) * 2006-05-02 2007-11-08 Harris Corporation Systems and methods for close queuing to support quality of service
US20070258445A1 (en) * 2006-05-02 2007-11-08 Harris Corporation Systems and methods for protocol filtering for quality of service
US7756134B2 (en) 2006-05-02 2010-07-13 Harris Corporation Systems and methods for close queuing to support quality of service
US7894509B2 (en) 2006-05-18 2011-02-22 Harris Corporation Method and system for functional redundancy based quality of service
US20070291656A1 (en) * 2006-06-16 2007-12-20 Harris Corporation Method and system for outbound content-based QoS
US20070291657A1 (en) * 2006-06-16 2007-12-20 Harris Corporation Method and system for rule-based sequencing for QoS
US20070291768A1 (en) * 2006-06-16 2007-12-20 Harris Corporation Method and system for content-based differentiation and sequencing as a mechanism of prioritization for QOS
US7990860B2 (en) 2006-06-16 2011-08-02 Harris Corporation Method and system for rule-based sequencing for QoS
US7856012B2 (en) 2006-06-16 2010-12-21 Harris Corporation System and methods for generic data transparent rules to support quality of service
US8516153B2 (en) 2006-06-16 2013-08-20 Harris Corporation Method and system for network-independent QoS
US8064464B2 (en) 2006-06-16 2011-11-22 Harris Corporation Method and system for inbound content-based QoS
US20070291780A1 (en) * 2006-06-16 2007-12-20 Harris Corporation System and methods for generic data transparent rules to support quality of service
US20070291653A1 (en) * 2006-06-16 2007-12-20 Harris Corporation Method and system for network-independent qos
US20070291766A1 (en) * 2006-06-16 2007-12-20 Harris Corporation Method and system for inbound content-based QoS
US20070291647A1 (en) * 2006-06-19 2007-12-20 Harris Corporation Method and System for Fault-Tolerant Quality of Service
US7916626B2 (en) 2006-06-19 2011-03-29 Harris Corporation Method and system for fault-tolerant quality of service
US20070291751A1 (en) * 2006-06-20 2007-12-20 Harris Corporation Method and system for compression based quality of service
US8730981B2 (en) 2006-06-20 2014-05-20 Harris Corporation Method and system for compression based quality of service
US7769028B2 (en) 2006-06-21 2010-08-03 Harris Corporation Systems and methods for adaptive throughput management for event-driven message-based data
US20070297416A1 (en) * 2006-06-21 2007-12-27 Harris Corporation Systems and methods for adaptive throughput management for event-driven message-based data
US20080025318A1 (en) * 2006-07-31 2008-01-31 Harris Corporation Systems and methods for dynamically customizable quality of service on the edge of a network
US8300653B2 (en) 2006-07-31 2012-10-30 Harris Corporation Systems and methods for assured communications with quality of service
US20080082631A1 (en) * 2006-09-29 2008-04-03 Motorola, Inc. Inter Application User Interface Integration in Element Management Systems
US8561143B2 (en) 2007-01-30 2013-10-15 Sprint Communications Company L.P. Proxy registration and authentication for personal electronic devices
US8365249B1 (en) * 2007-01-30 2013-01-29 Sprint Communications Company L.P. Proxy registration and authentication for personal electronic devices
US20100004984A1 (en) * 2008-07-02 2010-01-07 Verizon Data Services Llc Television distribution of product/service coupon codes
US8392940B2 (en) * 2008-07-02 2013-03-05 Verizon Patent And Licensing Inc. Television distribution of product/service coupon codes
US20100051030A1 (en) * 2008-09-04 2010-03-04 Sequal Technologies, Inc. System and Method for Controlling Bolus Pulse Duration Based on Inspiratory Time in an Oxygen Concentration System
US9278185B2 (en) * 2008-09-04 2016-03-08 Caire Inc. System and method for controlling bolus pulse duration based on inspiratory time in an oxygen concentation system
US8225988B1 (en) 2008-10-08 2012-07-24 Bank Of America Corporation Load balancing for cash handling devices
US20150278781A1 (en) * 2014-03-31 2015-10-01 Diebold Self-Service Systems Division Of Diebold, Incorporated Api engine for a self-service device

Also Published As

Publication number Publication date Type
WO2003101035A1 (en) 2003-12-04 application
US20040068657A1 (en) 2004-04-08 application

Similar Documents

Publication Publication Date Title
US6353853B1 (en) System for management of building automation systems through an HTML client program
US7254601B2 (en) Method and apparatus for managing intelligent assets in a distributed environment
US6282454B1 (en) Web interface to a programmable controller
US6587884B1 (en) Dual ethernet protocol stack for maximum speed access to a programmable logic controller (PLC)
US6484061B2 (en) Web interface to a programmable controller
US20030023681A1 (en) Sharing messaging device information among network users
US6970917B1 (en) System and method for remote control and management of wireless devices
US20020111698A1 (en) Web-based system for monitoring and/or controlling home devices
US20060168224A1 (en) Remote dynamic configuration of a web server to facilitate capacity on demand
US20070214262A1 (en) Personal server technology with firewall detection and penetration
US20050097159A1 (en) Apparatus and method for remotely sharing information and providing remote interactive assistance via a communications network
US6871211B2 (en) Intranet-based medical data distribution system
US20060031457A1 (en) System, computer program product and method for managing and controlling a local network of electronic devices
US20030069962A1 (en) Method for characterizing and directing real-time Website usage
US6349336B1 (en) Agent/proxy connection control across a firewall
US20020078198A1 (en) Personal server technology with firewall detection and penetration
US20030154110A1 (en) Method and apparatus for wireless access to a health care information system
US20100281161A1 (en) Method, system and apparatus for automated inventory reporting of security, monitoring and automation hardware and software at customer premises
US20030041096A1 (en) Transaction processing in a distributed data processing system
US20020138627A1 (en) Apparatus and method for managing persistent network connections
US6151625A (en) Internet web interface including programmable logic controller for controlling output devices based on status of input devices
US7032002B1 (en) Service broker for processing data from a data network
US7480715B1 (en) System and method for performing a predictive threat assessment based on risk factors
US20040143628A1 (en) Systems and methods that discover and configure non-TCP/IP networks and devices residing therein
US20020099831A1 (en) Managing requests for connection to a server

Legal Events

Date Code Title Description
AS Assignment

Owner name: VIGILOS, INC., WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ALEXANDER, BRUCE;ANTAL, DAVID;LITKE, MATTHEW;AND OTHERS;REEL/FRAME:014579/0087;SIGNING DATES FROM 20030721 TO 20030908

AS Assignment

Owner name: BAERWALDT, MARK, WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: BERTHY, LES & LINDA, AS COMMUNITY PROPERTY, WASHIN

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: BREMNER, ERIC & BARBARA, WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: CARPENTER, MICHAEL, IDAHO

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: CLIFFORD, STEVEN, WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: CORNFIELD, DAVID, WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: KEARNS, DENNIS C., MINNESOTA

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: KOULOGEORGE, MARK T., ILLINOIS

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: MCBRIDE, KENNETH, WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: THE RKD TRUST FBO R.S. RUSH III, WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: ROBERTS, DAVID L., WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: ROLLING BAY VENTURES LLC, WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: SCHADE, MARCIA, OHIO

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: FOOTH, D.L., WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: FOOTH, JAMES W., WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: FOOTH, RICHARD H., WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: WELLS, BRADLEY H. 1997 REVOCABLE TRUST, CALIFORNIA

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: SHURTLEFF, ROBERT D., WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: TEUTSCH, JOHN, WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: VITULLI, JOE R., WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

Owner name: YOUNG, CRAIG S., OHIO

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:015167/0564

Effective date: 20040625

AS Assignment

Owner name: ROBERTS, DAVID L., WASHINGTON

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: TEUTSCH, JOHN, WASHINGTON

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: TURLEY, JOSEPH F., WASHINGTON

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: SKINNER, DAVID, WASHINGTON

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: KEARNS, DENNIS C., MINNESOTA

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: BERTHY, LES & LINDA, AS COMMUNITY PROPERTY, WASHIN

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: YOUNG, CRAIG S., OHIO

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: BAERWALDT, MARK, WASHINGTON

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: VITULLI, JOE R., WASHINGTON

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: BAKKE, ELLEN, WASHINGTON

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: NOURSE, BENJAMIN C., CALIFORNIA

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: CARPENTER, MICHAEL, IDAHO

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: BLACK, FRASER AND DEIRDRE, WASHINGTON

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: CLIFFORD, STEVEN, WASHINGTON

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: MESLANG, RICHARD F. & MAUREEN M. TRUST, WASHINGTON

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: RKD TRUST FBO R.S. RUSH III, THE, WASHINGTON

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

Owner name: SHURTLEFF, ROBERT D., WASHINGTON

Free format text: AMENDED & RESTATED SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017286/0625

Effective date: 20050502

XAS Not any more in us assignment database

Free format text: AMENDED & RESTATED SECURITY AGMT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017105/0138

XAS Not any more in us assignment database

Free format text: AMENDED & RESTATED SECURITY AGMT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:017089/0315

AS Assignment

Owner name: VIGILOS, INC., WASHINGTON

Free format text: RELEASE BY SECURED PARTY;ASSIGNORS:BAERWALDT, MARK;BAKKE, ELLEN;BLACK, FRASER AND DEIRDRE;AND OTHERS;REEL/FRAME:017164/0357

Effective date: 20060210

AS Assignment

Owner name: NORTHWEST VENTURE PARTNERS III, L.P., WASHINGTON

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:018291/0195

Effective date: 20060921

CC Certificate of correction
FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: VIGILOS, INC., WASHINGTON

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NORTHWEST VENTURE PARTNERS III, L.P.;REEL/FRAME:023003/0884

Effective date: 20090722

AS Assignment

Owner name: NORTHWEST VENTURE PARTNERS III, L.P., DISTRICT OF

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:023148/0071

Effective date: 20090818

AS Assignment

Owner name: BOULDER RIVER HOLDINGS, LLC,ARIZONA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:024456/0524

Effective date: 20100511

Owner name: VIGILOS, LLC,TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BOULDER RIVER HOLDINGS, LLC;REEL/FRAME:024456/0531

Effective date: 20100528

Owner name: BOULDER RIVER HOLDINGS, LLC, ARIZONA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VIGILOS, INC.;REEL/FRAME:024456/0524

Effective date: 20100511

Owner name: VIGILOS, LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BOULDER RIVER HOLDINGS, LLC;REEL/FRAME:024456/0531

Effective date: 20100528

FPAY Fee payment

Year of fee payment: 8

RR Request for reexamination filed

Effective date: 20120915

B1 Reexamination certificate first reexamination

Free format text: CLAIM 23 IS CANCELLED.CLAIMS 1-22 AND 24-43 WERE NOT REEXAMINED.

SULP Surcharge for late payment
AS Assignment

Owner name: OLIVISTAR LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VIGILOS, LLC;REEL/FRAME:033046/0275

Effective date: 20140328

AS Assignment

Owner name: VIGILOS, INC., WASHINGTON

Free format text: RELEASE OF SECURITY INTEREST;ASSIGNOR:NORTHWEST VENTURE PARTNERS III, L.P.;REEL/FRAME:033162/0148

Effective date: 20100506

AS Assignment

Owner name: VIGILOS, INC., WASHINGTON

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE TO ADD ASSIGNOR SIGNATURE PAGE TO ASSIGNMENT DOCUMENT. PREVIOUSLY RECORDED ON REEL 014579 FRAME 0087. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT.;ASSIGNORS:BRUCE, ALEXANDER;ANTAL, DAVID;LITKE, MATTHEW;AND OTHERS;SIGNING DATES FROM 20030721 TO 20030908;REEL/FRAME:033199/0197

AS Assignment

Owner name: BANERTEK LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OLIVISTAR LLC;REEL/FRAME:038922/0792

Effective date: 20160610

REMI Maintenance fee reminder mailed
SULP Surcharge for late payment

Year of fee payment: 11

FPAY Fee payment

Year of fee payment: 12